You've requested...

All Systems Go: Novell & Microsoft Interoperability Web Seminar

If a new window did not open, click here to view this asset.

Download this next:

Analysis of the Linux Audit System

Audit mechanisms on an operating system (OS) record relevant system events to provide information for analysing the trustworthiness of the system. This is especially important for detecting or investigating potential compromises of a system.

In Linux-based operating systems, the standard framework for auditing is the Linux Audit Subsystem. It generates, processes and records relevant audit events either from within the kernel or from user-space programs. In this article, we identify serious flaws due to architectural limitations of the Linux kernel, which cast doubts on its ability to provide forensically sound audit records. We also examine these limitations and discuss possible mitigation methods.

These are also closely related to: "All Systems Go: Novell & Microsoft Interoperability Web Seminar"

  • How open source is spurring digital transformation

    From Linux to Kubernetes, open source software has been instrumental in supporting efforts by organisations across the Asia-Pacific region to transform digitally. In this e-guide, read more about open source developments across the region, including how Malaysia's AmBank has been using open source tools to engineer its software from the ground-up to suit its needs, rather than customise off-the-shelf products and ANZ Bank's move to Red Hat OpenShift, and what technology suppliers are doing to support deployments of containerised applications on open source platforms.

  • How to use VDI security to block cyberattacks

    The role of a server operating system is shifting. It has

    been influenced by cloud computing – whether it be

    public or private – as well as virtualisation.

     

    In this 12-page buyer’s guide, Computer Weekly explores:

    -          What’s new in Windows Server 2016; an OS designed with cloud in mind

    -          What has changed between Linux & Unix and the current state of play between the two competing OS

    -          The evolution of the server operating

    system, and sees the next generation moving into the cloud

Find more content like what you just read:

  • How to migrate Linux Servers from VMware ESX to Proxmox using Carbonite Migrate

    This video will show you how easy it is to migrate live running Linux or Windows servers from VMware ESX to Proxmox.

    Download

  • Migrating Windows servers from VMware ESX to Proxmox using Carbonite Migrate

    This video will show you how easy it is to migrate live running Linux or Windows servers from VMware ESX to Proxmox.

    Download

  • Menacing Malware: Exposing Linux Threats Lurking in Your Multi-Cloud

    90% of cloud runs on Linux, but current countermeasures are focused on addressing Windows-based threats, leaving multi-cloud deployments vulnerable to attacks. So, is it any wonder that Linux-based malware is propagating in multi-cloud environments under the radar?

    Download

  • A Computer Weekly Buyer's Guide to Application Development and DevOps

    Harnessing the right developer tools offers new advantages for businesses. In this 14-page buyer's guide, Computer Weekly looks at the benefits and limitations of the DevOps approach, what Microsoft is doing with its developer platform and the rise of the holistic application.

    Download

  • Automate your Dell Infrastructure with Red Hat Ansible

    Join this Dell and Red Hat webinar where you will see how Ansible Automation Platform works seamlessly with Windows and Linux all while integrating with Dell Technologies hardware platforms.

    Download

  • Ubuntu on WSL | An FAQ for Data Scientists and Developers

    Leverage the power of an Ubuntu development environment on Windows using Windows Subsystem for Linux (WSL). Ubuntu on WSL is particularly empowering for AI and ML data scientists. It combines the convenience of native Windows IDE and driver integration with the NVIDIA GPU accelerated AI/ML development environment Ubuntu is famous for. IT managers also benefit from a consistent fleet management experience whilst enabling their data scientists to continue using their preferred Ubuntu environment. Join us on a tour of Ubuntu on WSL that will cover: - The underlying technology behind WSL - How it differs from a traditional VM environment - Setting up Ubuntu on WSL for the first time - Using WSLg to run graphical Linux applications

    Download

  • Ubuntu on WSL | An FAQ for Data Scientists and Developers

    Leverage the power of an Ubuntu development environment on Windows using Windows Subsystem for Linux (WSL). Ubuntu on WSL is particularly empowering for AI and ML data scientists. It combines the convenience of native Windows IDE and driver integration with the NVIDIA GPU accelerated AI/ML development environment Ubuntu is famous for. IT managers also benefit from a consistent fleet management experience whilst enabling their data scientists to continue using their preferred Ubuntu environment. Join us on a tour of Ubuntu on WSL that will cover: - The underlying technology behind WSL - How it differs from a traditional VM environment - Setting up Ubuntu on WSL for the first time - Using WSLg to run graphical Linux applications

    Download

  • Royal Holloway: Testing antivirus efficacy in Linux

    Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.

    Download

  • Zarządzanie politykami konfiguracji w środowiskach Linux, Windows i Mac

    Zapraszamy na webinar w jęz. polskim na temat centralnego, zunifikowanego zarządzania politykami konfiguracji w środowiskach Linux, Windows, Mac zarówno on-premise jak i w chmurze. Orkiestracja polityk, ich konsolidacja i normalizacja to wymóg bezpieczeństwa w przypadku środowisk heterogenicznych obsługiwanych lokalnie oraz w chmurze. Na spotkaniu powiemy, jak zapewnić zautomatyzowane, scentralizowane i spójne zarządzanie i egzekwowanie polityk dla szerokiej gamy komputerów z systemami Linux, Windows i Mac. Na naszym webinarze zobaczysz, jak za pomocą Micro Focus Universal Policy Administrator wykorzystać posiadaną już infrastrukturę z Microsoft Active Directory oraz Group Policy dla Windows i rozszerzyć ją na systemy Linux do uwierzytelniania użytkowników w Microsoft Active Directory, a także jak zabezpieczać konfigurację serwerów Linux poprzez łatwe zdefiniowane zasad za pomocą graficznych narzędzi. Micro Focus Universal Policy Administrator służy do tworzenia i kontrolowania z jednej konsoli polityk (Group Policy) w przypadku korzystania z wielu środowisk jak Active Directory, Azure, Linux czy Mac. Umożliwia wersjonowanie, śledzenie zmian i wprowadzeniu procesów akceptacji. W pokazach na żywo będą wykorzystywane systemy Linux firmy SUSE, która jest partnerem wydarzenia.

    Download

  • EDUNation 2023 Forsyth Tech (2 of 3)

    Benefits of flexible teaching methods when teaching a diverse student body We all know the importance of meeting our students where they are when they enter our classroom, but how exactly do you do that? How do you operationalize teaching best practices? Is there a better way? I'll be suggesting that there is not. But learning what my students enjoy and how they think helps me adapt to techniques I use to better engage and motivate them to learn the material. In many ways, it is a quintessentially Linux approach. Build tools that do one thing really well and combine them in novel ways to reach the desired goal. I'll be sharing what I do with a few stories of what it looks like in my classroom.

    Download

  • EDUNation 2023 Forsyth Tech (2 of 3)

    "Benefits of flexible teaching methods when teaching a diverse student body We all know the importance of meeting our students where they are when they enter our classroom, but how exactly do you do that? How do you operationalize teaching best practices? Is there a better way? I'll be suggesting that there is not. But learning what my students enjoy and how they think helps me adapt to techniques I use to better engage and motivate them to learn the material. In many ways, it is a quintessentially Linux approach. Build tools that do one thing really well and combine them in novel ways to reach the desired goal. I'll be sharing what I do with a few stories of what it looks like in my classroom."

    Download

  • Installing and Configuring Carbonite Migrate on Ubuntu and Exoscale

    Carbonite Migrate can be used to migrate live physical, virtual or cloud servers to the same or different platforms. In order to migrate live open files, a small agent needs to be installed and configured on the source (current production server) and the target (new destination server). This video shows how to install and configure the Carbonite replication agent on Ubuntu Linux. The same steps can be used on any physical or ubuntu server, however the process to install on Red Hat, Oracle Enterprise Linux, SUSE, CentOS and Rocky would be very similar. We'll show how easy it is to provision a suitable target server in Exoscale Cloud, as we will be creating a follow on video showing how to migrate Linux servers from VMware ESX to Exoscale. The process for Windows servers would be very similar, and I have already posted a video showing Full Server migration of a Windows 2019 server from Microsoft Azure to Exoscale Cloud.

    Download

  • Windows 10: How the client operating system is evolving

    A discussion about strategies for Windows 10 really boils down to the organisation's desktop IT strategy. Windows PCs account for the bulk of the personal computing market and the Windows client remains the dominant target platform for developers of client-side applications. In this e-guide, we look at the evolution of desktop IT.

    Download

  • Using Behavior to Detect Intrusions Involving Edge Devices

    Any Internet-facing device, appliance, server, or VM is fair game as an initial attack vector to a cyber attacker. They are readily accessible remotely and offer security teams little visibility into whether they are secure, under attack, or compromised. Additionally, those devices running on a Linux kernel can prove to be valuable assets to an attacker: A Linux device can be made a stealthy persistent foothold from which to pivot and begin attacks on your Windows infrastructure, it can be used to assist in exfiltration, and just because it’s been patched doesn’t mean it hasn’t already been exploited and continues to provide access via web shell. All this while your security team may be unaware these devices are still compromised. Attackers choosing to pivot and focus on gaining access to your Windows environment, historically expose themselves to detection through indicators of compromise (IoC) on the network, as well as within the Windows OS, applications, and Active Directory. But with many attackers working to hide their tracks, how can organizations detect attacks and trace them back to edge devices?

    Download

  • Using Behavior to Detect Intrusions Involving Edge Devices

    Any Internet-facing device, appliance, server, or VM is fair game as an initial attack vector to a cyber attacker. They are readily accessible remotely and offer security teams little visibility into whether they are secure, under attack, or compromised. Additionally, those devices running on a Linux kernel can prove to be valuable assets to an attacker: A Linux device can be made a stealthy persistent foothold from which to pivot and begin attacks on your Windows infrastructure, it can be used to assist in exfiltration, and just because it’s been patched doesn’t mean it hasn’t already been exploited and continues to provide access via web shell. All this while your security team may be unaware these devices are still compromised. Attackers choosing to pivot and focus on gaining access to your Windows environment, historically expose themselves to detection through indicators of compromise (IoC) on the network, as well as within the Windows OS, applications, and Active Directory. But with many attackers working to hide their tracks, how can organizations detect attacks and trace them back to edge devices?

    Download

  • Интеграция MFA в облачные наземные и локальные сервисы

    Обзор методов аутентификации пользователей Web Authentication Method Windows Hello Примеры интеграции : - с облачными сервисами - наземными сервисами и приложениями - локальные компьютера Интеграция с сервисами с использованием OAuth 2.0 RADIUS Server SAML 2.0 REST API Реализация многофакторной аутентификации в VPN Защита рабочей станции Windows с помощью многофакторной аутентификации - Desktop OTP Tool - Device Service - Linux PAM Client - Mac OS X Client - Windows Client - Windows Authentication Agent - Virtual Desktop Authentication Интеграция с PAM системами.

    Download

  • Discover the latest cyber threat trends

    What does your cybersecurity posture look like in 2023? Tune into this webinar from Towerwall Founder and CEO Michelle Drolet as she discusses the latest cyberthreat trends and provides the necessary insights to defend against evolving attacks. Based on the research and real-world experiences, we will discuss: • The lasting cyber impact of the war in Ukraine. • The maturity of the “as-a-service” industry and how it has put advanced threat tactics into the hands of nearly any criminal. • How ransomware operators have evolved their activities and mechanisms, both to evade detection and to incorporate novel techniques. • A deep dive into the abuse of legitimate security tools by criminals to execute attacks. • An analysis of the threats facing Linux, Mac, and mobile systems.

    Download

  • How to Secure Your Software Supply Chain on Windows Server

    Enterprises depend on a secure software development pipeline—from the first stage of development to production. Secure cloud native application delivery demands a secure, enterprise-ready container runtime, but building and running Windows containers on Windows Server poses unique challenges. How can teams using Windows Server ensure that their software supply chain is built on a steady foundation? In this webinar, we’ll explore the challenges and how to overcome them using Mirantis Container Runtime, the only enterprise container engine that runs natively on Windows and Linux, delivering FIPS 140-2 validated security. We’ll discuss: - The challenges of securing the software supply chain on Windows Server - The role of the container runtime in a secure software supply chain - Tools to help secure container workflows on Windows Server - How Mirantis Container Runtime provides a secure runtime for Kubernetes nodes running on Windows Server

    Download

  • VMware ESX to Exoscale Windows Migration Demo

    This video will show you how easy it is to migrate live running Windows server from VMware ESX to Exoscale Cloud. We're using Carbonite Migrate to make a real time copy of a live Windows 2019 virtual machine currently running on a VMware ESX and replicating it to a virtual machine we have previously provisioned in Exoscale Cloud. Downtime is kept to the absolute minimum. Installation, configuration and the mirroring (synchronisation) of the server, it's configuration, applications and data, all take place while the source ESX virtual machine remains live, and it's only for the last couple of minutes at the end, when the ESX source server is shutdown and the new Exoscale server is started up, which typically takes 10 to 15 minutes. The same type of migration could be performed for other Windows versions (2003, 2008, 2008R2, 2012, 2012R2, 2016, 2019, 2022) and there is a very similar workflow available for Linux Environments (Red Hat, CentOS, SUSE, Oracle Enterprise Linux, Rocky). These servers could be physical, virtual or cloud, and they could be running pretty much any application.

    Download

  • Migrating Windows VMware ESX to IONOS Cloud

    This video will show you how easy it is to migrate live running Windows server from VMware ESX to IONOS Cloud. We're using Carbonite Migrate to make a real time copy of a live Windows 2019 virtual machine currently running on a VMware ESX and replicating it to a virtual machine we have previously provisioned in IONOS Cloud. Downtime is kept to the absolute minimum. Installation, configuration and the mirroring (synchronisation) of the server, it's configuration, applications and data, all take place while the source ESX virtual machine remains live, and it's only for the last couple of minutes at the end, when the ESX source server is shutdown and the new IONOS server is started up, which typically takes 10 to 15 minutes. The same type of migration could be performed for other Windows versions (2003, 2008, 2008R2, 2012, 2012R2, 2016, 2019, 2022) and there is a very similar workflow available for Linux Environments (Red Hat, CentOS, SUSE, Oracle Enterprise Linux, Rocky). These servers could be physical, virtual or cloud, and they could be running pretty much any application.

    Download

  • QTS - Patch Management Made Easy With Qualys

    Join Qualys for the latest in our Qualys Technical Series, on Thursday 9th March, for a deep dive into Qualys Patch Management. Qualys Patch Management enables organizations to centrally manage and automate the patching process across their entire IT infrastructure, including Windows, Linux, and Mac operating systems, mobile devices, and 3rd-party applications from various vendors. With a unified dashboard, multiple teams can collaborate on prioritising and deploying the right patches to reduce risk. If you're seeking a solution to streamline patch management across your organization, join us for an in-depth demonstration of how Qualys Patch Management can help. During this webinar, you will discover how to: Prioritise your critical patches using Qualys TruRisk Automate routine and risk-based remediation for Windows, Linux and Mac assets Install / Uninstall software and run scripts as part of your remediation jobs, as some remediation require more than just patching

    Download

  • Extend identity security to Linux and Windows servers

    Linux and Windows servers power business-critical services and are managed by highly privileged users, making them potential targets for attackers. While most organizations have deployed identity security controls for workstations, servers remain overlooked. Read the e-book to learn more.

    Download

  • Navigating Investing during Novel Coronavirus

    Navigating Investing during Novel Coronavirus

    Download

  • Carbonite® Availability Demo video

    Carbonite® Availability software enables IT organizations to maintain the highest availability of their Windows and Linux servers by preventing downtime and data loss. With support for physical, virtual or cloud source systems or target environments, the Carbonite Availability solution is a comprehensive high availability option for organizations with mixed IT environments. Watch our short (7 mins) video to learn more.

    Download

  • Databridge Customer Briefing

    Micro Focus Databridge enables organizations to leverage and integrate the value of their DMSII data with other information systems for business analytics and operational purposes. Databridge is an out of-the-box extract, transform, load (ETL) solution that securely mirrors DMSII and non-DMSII data with secondary working databases while keeping data updated in real time. Databridge fits seamlessly into your existing infrastructure with support for Oracle, Microsoft SQL Server, and flat file target clients, running on a range of operating environments including Windows Server, UNIX, AIX, SUSE Linux, and Red Hat Linux.

    Download

  • Citrix for Specialized Workers

    Contact center agents, retail employees, and other specialized workers - they’re all essential to your business. But when change and expansion can come in an instant, you need to train new workers just as fast - without sacrificing cybersecurity. Citrix and Chrome OS provide secure, easy access to specialized applications, including full-feature Windows and Linux apps, from any Chrome OS device.

    Download

  • Dell & Red Hat Present Microsoft SQL on Red Hat Enterprise Linux

    Unlocking the full potential of data is critical to success of any organization, and Microsoft SQL Server running on top of Red Hat Enterprise Linux helps your organization do just that. Red Hat Enterprise Linux is core to the foundation of building a unified data platform on Microsoft SQL Server. Join Dell and Red Hat for this informative webinar to learn how Dell Technologies combined with Red Hat and Microsoft deliver a fully supported stack on a platform of choice, giving your organization intelligence over all of the data. Topics include: o Considerations for running SQL Server 2019 on Red Hat Enterprise Linux o Considerations for running SQL Server 2019 BDC on Red Hat OpenShift Platform o Performance gains when running SQL Server 2019 on Red Hat Enterprise Linux o Considerations for moving from existing versions of SQL Server running on the Windows platform to SQL Server 2019 running on Red Hat Enterprise Linux Presented by: Trey Mears, Red Hat Alliance Manager Rob Sonders, Principal Engineer, SQL Expert Stephen McMaster, Technology Strategist, Microsoft

    Download

  • PPMO™: Disrupting Biomarker & Target Discovery using AI computational modeling

    Learn more about these topics by registering for this webinar: • PPMO™: a novel Pharmaco-Pheno-Multiomic platform which combines AI-powered discovery tools with rapid and efficient experimental validation workflows • Learn how to significantly accelerate and confidently identify a high value-novel pipeline of targets and biomarkers through AI-powered modeling • Learn how Champions leverages PPMO™ to support biomarker and target discovery efforts

    Download

  • Red Hat Ansible with Dell Technologies

    Times like these have required many organizations to scale up capacity and make changes to accommodate remote workers and other surges in demand that are almost unprecedented. Join us for a webinar where we will show you how Ansible Automation Platform works seamlessly with Windows and Linux all while integrating with your Dell Technologies hardware platforms. You’ll also learn about how to use Ansible to manage, integrate, and support your growing environment – all while using tools you are familiar with to keep up with capacity demands of the shifting world.

    Download

  • InfoConnect Desktop Customer Briefing

    Micro Focus is pleased to announce the general availability of InfoConnect Desktop 16.2 products, the latest releases of the leading enterprise-grade solutions for desktop access to Unisys, IBM, UNIX, Linux, OpenVMS, HP 3000, and X Window (X11) host applications and data. Attend this webinar to learn about this latest release, including updates to platforms, central management, security, automation, productivity, and end user experience.

    Download

  • Managing Third Party Vendor Access? See What’s New with CyberArk Alero

    In today’s landscape with vendors requiring access to a variety of internal systems, including cloud applications, Windows and Linux systems, OT environments, and more, having a robust solution to secure access without straining resources has never been more important. Chris Maroun, Global Director of Solutions Engineering will walk through an in-depth service demo and explain how organizations can leverage Alero to more securely and more efficiently manage remote vendors who require access to critical internal systems.

    Download

  • Developing the Intelligent Core with Windows Server 2019

    65% of European CEOs are under significant pressure to deliver on their digital transformation (DX) strategies. Creating a digital platform with an intelligent core is key to success. Learn more about digital platforms inside this resource.

    Download

  • Efficient AAV Production Scale-up to Accelerate Gene Therapy Development

    Success in gene therapy relies on the ability to safely and precisely deliver a genetic payload to the intended target cells. This presentation describes a novel approach that combines next-gen library synthesis, next-gen sequencing, artificial intelligence, and novel fixed bed bioreactor technology to accelerate the production of improved indication-specific AAV capsids, to deliver therapeutic transgenes. The speaker will share their strategy for efficiently scaling up high throughput AAV library production, including results from recent studies using the Corning® Ascent™ fixed bed bioreactor technology.

    Download

  • Why EDRs still can’t stop ransomware or breaches

    Despite enterprises’ best efforts, cyber criminals continue to succeed in breaching and ransomware attacks by capitalizing on human error. And security controls like EDR/XDR continue to be insufficient in combating these attacks. Join this session to learn about a novel approach to Defense in Depth model which includes microsegmentation to better protect your workloads, from legacy systems, to virtualized and cloud instances. You will learn: Common pitfalls of traditional endpoint security solutions The novel Defense in Depth approach Why microsegmentation needs to be prioritized over security controls like EDR/XDR, both modern and traditional

    Download

  • Discover how Linux has changed the tech industry

    In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.

    Download

  • Threat Hunting For Novel Malware Activities

    In the evolving landscape of cybersecurity, traditional "out of the box" solutions and Indicator of Compromise (IOC) functionalities often fall short in addressing novel malware threats and post-exploitation activities. In this webinar we will we will share with you advanced techniques for uncovering and mitigating sophisticated cyber threats. This talk will delve into real-world tips and methodologies for hunting and investigating novel malware activities. We will explore the intricacies of on-the-fly log parsing and nested field analysis, showcasing how these skills are essential in detecting subtle and obfuscated attacker behaviors. Participants will learn the process of reassembling egress streams to reconstruct attacker communications and exfiltration strategies, as well as decoding complex attacker payloads to understand the full scope of the threat. By attending this session, attendees will gain valuable insights into proactive threat-hunting strategies that go beyond conventional security measures. We will demonstrate how to effectively identify and respond to novel attacks, emphasizing the importance of a dynamic and thorough approach to cybersecurity. Webinar duration: 45 minutes

    Download

  • Bridging the Cloud-to-Edge Divide with Enterprise-Grade Linux

    As enterprises face increasing complexity in managing cloud-to-edge workloads, eLxr Pro offers a unified, enterprise-grade Linux solution to streamline operations and drive innovation. Backed by Wind River's expert support, this platform empowers businesses to scale seamlessly and thrive in a connected world. Read the white paper to learn more.

    Download

  • Ansible 101: An introduction to automating everything with training

    Join this webinar to find out more about the benefits of using Ansible Automation Platform to simplify tasks across a variety of cloud and networking devices, like Red Hat Enterprise Linux® and Microsoft Windows. In this webinar, we will cover: - A technical overview of Ansible Automation Platform and Red Hat Ansible Tower Benefits to using Ansible Automation Platform and Red Hat Ansible Tower to manage complex automation workflows - A demonstration of using Ansible Automation Platform to automate across multiple environments An outline of Ansible Automation Platform curriculum offered by Red Hat Training"""

    Download

  • Microsoft SQL Server 2022 on Red Hat Enterprise Linux

    Organizations are transforming and running business-critical workloads across clouds and hybrid environments. To be successful, the need to secure workloads and data is imperative. Join us to find out how Windows SQL Server 2022 and Red Hat Enterprise Linux enables you to run business-critical workloads anywhere — for modernization, improved performance and reduced costs to stay ahead of emerging security threats. Join us to learn more about the value of Microsoft SQL Server 2022 on RHEL-based platforms.This demo driven session will leave you with actionable next steps and links to a reference architecture.

    Download

  • Getting Started with Carbonite® Availability

    High availability for critical applications Downtime strikes IT organizations from a multitude of sources and IT teams are certain that downtime will strike their systems. Carbonite® Availability enables IT organizations to maintain the highest availability for their Windows and Linux servers by preventing downtime and data loss. With support for physical, virtual and cloud environments, you can have the peace of mind that your business will not miss a beat with this comprehensive high availability option. In this demonstration, we’ll demonstrate the failover capabilities of Carbonite Availability. To speak with an expert or request a free trial please visit https://go.carbonite.com/speak-with-an-expert.html

    Download

  • Focus: Application Virtualisation

    This e-guide focuses on application virtualisation and how big companies are finding various ways to stop applications adversely affecting each other.

    Download

  • Ubuntu ESX to Exoscale Migration Demo

    This video will show you how easy it is to migrate live running Linux server from VMware ESX to Exoscale Cloud. We're using Carbonite Migrate to make a real time copy of a live Ubuntu 20.04.6 virtual machine currently running on a VMware ESX and replicating it to a virtual machine we have previously provisioned in Exoscale Cloud. A video showing how to install and configure the target virtual machine can be found here: https://www.brighttalk.com/webcast/18665/609766?bt_tok={{lead.Id}}&utm_source=OpenTextCybersecurityEMEA&utm_medium=brighttalk&utm_campaign=609766 Downtime is kept to the absolute minimum. Installation, configuration and the mirroring (synchronisation) of the server, it's configuration, applications and data, all take place while the source ESX virtual machine remains live, and it's only for the last couple of minutes at the end, when the ESX source server is shutdown and the new Exoscale server is started up, which typically takes less than 2 minutes. The same type of migration could be performed for other Linux Environments (Red Hat, CentOS, SUSE, Oracle Enterprise Linux, Rocky) or Windows (2003, 2008, 2008R2, 2012, 2012R2, 2016, 2019, 2022). These servers could be physical, virtual or cloud, and they could be running pretty much any application.

    Download

  • Royal Holloway: An enhanced approach for USB security management

    USB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.

    Download

  • Accelerated Virtual Workstations for Media & Entertainment

    To address the need for collaboration among creative professionals—and to provide opportunities for more iterations in less time—M&E companies are starting to turn to virtual desktop infrastructure (VDI). NVIDIA virtual GPU software enables artists to work productively from anywhere on almost any device with access to Windows- based applications, or even the Linux-, CUDA-, and OpenCL-based applications they rely on for production. Please join Dell and NVIDIA and find out how your organization will benefit by implementing Dell VDI solutions with NVIDIA vGPU to support the most performant virtual workstations available for content production, visual effects, game development and rendering

    Download

  • How To Think Like A Threat Actor

    One of the most important steps to preventing a cybersecurity breach is understanding your adversary. The latest Uptycs threat research will help you get a leg up on the bad guys. Amit Malik and Ashwin Vamshi from Uptycs join Threatpost host Becky Bracken to walk through their latest research, explain what it means to organizations and answer specific questions from the audience. A Few Highlights: * Commonly abused commands and utilities in Linux, macOS and Windows * Malware families seen most prevalently seen across platforms * Active threat actors and recent targeted malware attacks * Important vulnerabilities to prioritize across platforms * Steps you can take to detect these actions and improve your security

    Download

  • How To Think Like A Threat Actor

    One of the most important steps to preventing a cybersecurity breach is understanding your adversary. The latest Uptycs threat research will help you get a leg up on the bad guys. Amit Malik and Ashwin Vamshi from Uptycs join Threatpost host Becky Bracken to walk through their latest research, explain what it means to organizations and answer specific questions from the audience. A Few Highlights: * Commonly abused commands and utilities in Linux, macOS and Windows * Malware families seen most prevalently seen across platforms * Active threat actors and recent targeted malware attacks * Important vulnerabilities to prioritize across platforms * Steps you can take to detect these actions and improve your security

    Download

  • How to run containers at the edge with Mirantis Container Runtime

    From manufacturing to telco to retail, countless industries are leveraging containerized applications at the edge to reduce latency, control their data, and process data where it matters most. In this webinar, we’ll discuss how to run containers at the edge with Mirantis Container Runtime—whether you’re using Kubernetes, Swarm, or standalone MCR—and demo the runtime in an edge environment. Attendees will learn: - Use-cases for containers at the edge - The benefits and challenges of running containers in edge environments - Pros and cons of Kubernetes, Swarm, and standalone MCR at the edge - How MCR forms the backbone of a secure, robust edge architecture on Windows or Linux

    Download